During the security assessment of the Mmm Simple File List plugin, a critical vulnerability was unearthed in versions up to 2.3. This vulnerability allowed an attacker to bypass the plugin’s directory restrictions, potentially accessing and listing files outside the WordPress root directory. This issue could be exploited by a user with Subscriber privileges.
Plugin Security Certification: “Age Gate” – Version 3.7.1: Safeguarding Age-Restricted Content

Age restrictions are a common requirement in various online scenarios, from viewing movie trailers to accessing adult-themed content. Managing age-restricted content on your website is a delicate task, and the “Age Gate” plugin, now at version 3.7.1, offers a solution that not only ensures compliance but also prioritizes security. In this article, we delve into the importance of this plugin, focusing on its security features and its recognition through the “Plugin Security Certification” (PSC).
Plugin Security Certification: “Wp Maximum Upload File Size” – Version 1.1.1: Safely increasing the file size

In the world of WordPress plugins, security isn’t just a matter of protecting against vulnerabilities but also ensuring the smooth operation of your site. The “Wp Maximum Upload File Size” plugin, now at version 1.1.1, is dedicated to enhancing your site’s file upload capabilities without compromising security. In this article, we explore the significance of this plugin, how it addresses upload file size and execution time limitations securely, and its achievement of the “Plugin Security Certification” (PSC).
CVE-2023-5817 – Neon Text =<1.1 – Stored XSS via shortcode (Author+)

During a security assessment of the Neon Text WordPress plugin, a critical vulnerability was identified in versions up to 1.1. This plugin, which is designed for adding neon text effects to posts, allowed for a Stored Cross-Site Scripting (XSS) attack via the use of shortcodes. This vulnerability was discovered through rigorous testing and analysis.
CVE-2023-4799 – Magic Embeds <= 3.0.10 - Stored XSS via shortcode (Contributor+) - POC
CVE-2023-5774 – Animated Counters – Stored XSS via shortcode (Author+) – POC

In the context of CVE-2023-5774, the vulnerability allows an attacker to embed a malicious script within a shortcode in a new post. The script is stored on the server and executed when other users, particularly those with Author or higher privileges, view the post. This could potentially lead to a full account takeover of the compromised user.
CVE-2023-5618 – Modern Footnotes – Stored XSS via shortcode – POC

In the realm of WordPress, where plugins are integral to extending functionality, a critical vulnerability was recently unearthed. Labeled CVE-2023-5618, this vulnerability is associated with the Modern Footnotes plugin, which, in the hands of an attacker, enables the execution of Stored Cross-Site Scripting (XSS) attacks via embedded shortcodes.
CVE-2023-4930 – Front End PM – Directory Listing to Sensitive data exposure – POC

During testing, a critical vulnerability was discovered in the plugin, namely a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users without their permission.
Plugin Security Certification: “Author List” – Version 2.0.3: Secure List of Authors

When it comes to managing and presenting your website’s authors, security should always be a top priority. The “Authors List” plugin, now at version 2.0.3, not only simplifies the process of displaying a list or grid of post authors (or any other user role) but also places a strong emphasis on security. In this article, we delve into the security enhancements of this plugin and highlight its prestigious “Plugin Security Certification” (PSC) awarded by CleanTalk.
CVE-2023-4836 – User Private Files – IDOR to Sensitive data and private files exposure / leak of info – POC

While conducting a comprehensive evaluation of the User Private Files plugin, a significant security vulnerability was identified – “Insecure Direct Object References (IDOR).” This vulnerability allows malicious actors to access someone else’s folders, download files without consent, and potentially expose sensitive data. Even users who have never shared their files are at risk. Remarkably, this security flaw can be exploited by users with minimal privileges, such as “Subscribers,” provided that a page with the plugin’s shortcode exists on the website or by “Contributors” when creating a page with the plugin.